Back to Results
First PageMeta Content
Web hosting / Cloud infrastructure / Rackspace / Computer security / Application firewall / Cloud storage / Rackspace Cloud / Cloud communications / Cloud computing / Centralized computing / Computing


How to Bring Shadow IT into the Light 8 Steps Along the Path Contents
Add to Reading List

Document Date: 2014-09-30 09:13:10


Open Document

File Size: 332,64 KB

Share Result on Facebook

City

San Antonio / Windcrest / Indianapolis / /

Company

Rackspace US Inc. / PriceWaterhouseCoopers / Equinix Corporation / CNO Financial Group / OpenStack / Forbes.com / Gartner Group / SaaS / /

Country

United States / /

Currency

USD / /

Facility

The Ponemon Institute / /

IndustryTerm

technology ready / service broker / pre-offer further cloud services / detection tool / apps available through your enterprise portal / individual server / Web App Firewall Log / outbound web communication / cloud applications / evasion network / demand cloud services / smart services / cloud services / off-premises services / /

OperatingSystem

CTOs / /

Organization

Ponemon Institute / /

Person

Todd Coombes / Julia King / Tom Groenfeldt / Brian Lillie / Christy Pettey / /

/

Position

Each LOB Manager / LOB Manager / architect / Dedicated Firewalls Intrusion Detection System Web App Firewall Log Manager / service broker / founder / engineer / No CIO / terms CIO / CTO / IT chief / outside CIO / major step forward / Path Executive / CIO / Chief Technical Officer / cloud service broker / Manager Armed / /

ProvinceOrState

Texas / /

PublishedMedium

ComputerWorld / /

Technology

operating system / pdf / firewall / http / SAN / /

URL

http /

SocialTag